Bring Your Own Device (BYOD) stories - Page 7
One of the more obvious acronyms you’ll encounter in the information technology, BYOD is exactly what it appears to be: your own devices used at home, but brought into the office and used for work. BYOD is a big deal in the technology space because it requires careful management, with issues including keeping personal information and apps separate from professional ones, securing company data, and establishing how support is provided. With the proliferation of smartphones, tablets and personally-owned laptops and other devices, BYOD is a practical reality for almost every organisation today.
Bring Your Own PC security to transform businesses within five years - Gartner
Thu, 27th Aug 2020
#
casb
#
cybersecurity
#
byod
BYOPC security will transform businesses within five years, with mainstream adoption expected within two to five years, according to a new report from Gartner.
BYOD security in remote work era still riddled with issues
Fri, 10th Jul 2020
#
dlp
#
data privacy
#
hybrid & remote work
BYOD security remains fraught with risks in the remote work era, as Bitglass' latest report highlights major gaps in corporate data protection efforts.
All we need to know about reverse proxy
Thu, 4th Jun 2020
#
iaas
#
casb
#
byod
Understanding reverse proxies is essential for modern organisations seeking robust cloud security. Discover why this architecture stands out.
The BYOD juggling act: balancing security, privacy and mobility
Thu, 5th Dec 2019
#
dlp
#
data privacy
#
byod
The productivity benefits of enabling cloud and mobile mean most organisations offer BYOD. But it's a headache for IT teams. Is there a balance?.
Jamf extends Apple expertise through security firm buyout
Mon, 19th Aug 2019
#
mdm
#
apple
#
byod
Jamf has acquired Digita Security to enhance its Apple management suite with robust endpoint protection, addressing rising Mac demand and security needs.
Businesses failing to secure BYOD - Bitglass
Fri, 3rd May 2019
#
dlp
#
ueba
#
cybersecurity
Report finds that 74% of organisations allow BYOD but nearly half lack clear security policies and best practices.
Sophos offering mobile device management with Microsoft Intune integration
Tue, 2nd Apr 2019
#
firewalls
#
network infrastructure
#
endpoint protection
Running on Microsoft Azure, the Sophos integration will enable IT administrators to configure individual device usage policies within Microsoft Intune.
BYOD can be secure with the right measures
Mon, 25th Mar 2019
#
endpoint protection
#
mfa
#
iam
Companies that embrace BYOD are giving employees more freedom to work remotely, resulting in increased productivity, cost savings, and talent retention.
Why endpoint security is critical in a post-perimeter era
Thu, 22nd Nov 2018
#
malware
#
endpoint protection
#
casb
Traditional perimeter-based security strategies – once the backbone of enterprise security – simply no longer apply.
Is BYOD an expensive mistake for your business?
Wed, 22nd Aug 2018
#
byod
#
mobility
#
wavelink
Although BYOD can seem like a cost-effective mobility solution, experts warn it might backfire due to security, productivity, and cost concerns.
Venafi announces new enterprise endpoint management solution
Wed, 4th Jul 2018
#
endpoint protection
#
encryption
#
edr
Organisations must provide mobile devices of all types with secure machine identities that support authentication, encryption and decryption.
Unisys extends cyber protection to IoT and connected devices
Wed, 18th Apr 2018
#
mdm
#
iot
#
healthtech
Unisys has moved to include Internet of Things (IoT) devices and other internet connected equipment in the new version of its Unisys Stealth.
57% of enterprises suspect their mobile workers have been hacked
Wed, 28th Mar 2018
#
vpns
#
cybersecurity
#
byod
iPass has released the results of a survey that sought to determine how companies are dealing with the trade-off between security and mobile workers.
Why a secure perimeter is no longer enough protection for your IT infrastructure
Mon, 12th Mar 2018
#
mfa
#
mdm
#
iam
Digital identity is used as the key method of protecting digital assets regardless of their location or how they are being accessed.
Struggling with IoT or BYOD? Here's how to overcome the main challenges
Fri, 19th Jan 2018
#
firewalls
#
network security
#
iot
The ideas of 'bring your own device' (BYOD) and Internet of Things (IoT) are a dream come true for most employees – but a nightmare for IT staff.
Android's poor system update process is putting devices at risk
Tue, 12th Dec 2017
#
mdm
#
google
#
byod
Singh says that even one year after Android 7.0 Nougat was released, only 17% of devices run the operating system. The statistics are poorer for 7.1.
Never worry about device security policies again with an NAC
Mon, 20th Nov 2017
#
firewalls
#
network security
#
iot
IDC interviewed five organisations that use Aruba ClearPass as a policy management platform for network access control.
1 in 4 organisations relying solely on passwords to secure BYOD
Tue, 7th Nov 2017
#
malware
#
mfa
#
casb
Bitglass has released the findings from its newest research, 'BYOD and Identity', which are alarming to say the least.
The internet of security things: Protecting data with a mobile workforce
Mon, 16th Oct 2017
#
daas
#
mdm
#
iot
IGEL's Jeff Kalberg outlines 5 technical developments aimed at improving mobile data security and endpoint experiences resellers and MSPs can harness.
SOTI reports increased global revenue and partner growth
Mon, 2nd Oct 2017
#
mdm
#
iot
#
partner programmes
The launch of the SOTI ONE platform in May saw the company grow the number of customer trials by 57% from the previous year.